Author:
Jin Chengbin,Zhou Yongbin
Abstract
AbstractSide-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of SCA, the number of attack data directly determines the performance of SCA. With sufficient attack data, the adversary can achieve a successful SCA. However, in reality, the cryptographic device may be protected with some countermeasures to limit the number of encryptions using the same key. In this case, the adversary cannot use casual numbers of data to perform SCA. The performance of SCA will be severely dropped if the attack traces are insufficient. In this paper, we introduce wavelet scatter transform (WST) and short-time fourier transform (STFT) to non-profiled side-channel analysis domains, to improve the performance of side-channel attacks in the context of insufficient data. We design a practical framework to provide suitable parameters for WST/STFT-based SCA. Using the proposed method, the WST/STFT-based SCA method can significantly enhance the performance and robustness of non-profiled SCA. The practical attacks against four public datasets show that the proposed method is able to achieve more robust performance. Compared with the original correlation power analysis (CPA), the number of attack data can be reduced by 50–95%.
Funder
National Natural Science Foundation of China
Yunnan Provincial Major Science and Technology Special Plan Projects
China Postdoctoral Science Foundation
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference63 articles.
1. AES_HD (2018) The AES_HD database - Unprotected hardware-based implementation of AES. https://github.com/AESHD/AES_HD_Dataset
2. AES_RD (2017) The AES_RD database - Trace sets with random delays. https://github.com/ikizhvatov/randomdelays-traces
3. Akkar M-L, Giraud C (2001) An implementation of des and aes, secure against some attacks. In: Koç ÇK, Naccache D, Paar C (eds) Cryptographic hardware and embedded systems—CHES 2001. Springer, Berlin, Heidelberg, pp 309–318
4. Allen J (1977) Short term spectral analysis, synthesis, and modification by discrete fourier transform. IEEE Trans Acoust Speech Signal Process 25(3):235–238. https://doi.org/10.1109/TASSP.1977.1162950
5. Andén J, Mallat S (2013) Deep scattering spectrum. IEEE Trans Signal Process. https://doi.org/10.1109/TSP.2014.2326991
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献